[go: up one dir, main page]

Kojima et al., 2021 - Google Patents

A new schnorr multi-signatures to support both multiple messages signing and key aggregation

Kojima et al., 2021

View PDF
Document ID
13446733210910236083
Author
Kojima R
Yamamoto D
Shimoyama T
Yasaki K
Nimura K
Publication year
Publication venue
Journal of Information Processing

External Links

Snippet

A digital signature is essential for verifying people's reliability and data integrity over networks and is used in web server certificates, authentication, and blockchain technologies. Specifically, to solve the bitcoin scalability problem, Multi-Signature (MS) schemes have …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model

Similar Documents

Publication Publication Date Title
Chi et al. A privacy-preserving zero-knowledge proof for blockchain
Singh et al. Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection
Chow et al. Server-aided signatures verification secure against collusion attack
Hafizul Islam et al. Dynamic id-based remote user mutual authentication scheme with smartcard using elliptic curve cryptography
WO2014068427A1 (en) Reissue of cryptographic credentials
CN118473637A (en) Cross-chain identity authentication method and system based on group signature and zero knowledge proof
Zhu et al. An efficient decentralized identity management system based on range proof for social networks
Agrawal et al. Game-set-MATCH: Using mobile devices for seamless external-facing biometric matching
Deng et al. FutureDID: A fully decentralized identity system with Multi-Party verification
Yang et al. A minimal disclosure signature authentication scheme based on consortium blockchain
CN116383894A (en) Modifiable alliance chain performance optimization method based on verifiable VDCH function
Kojima et al. A new schnorr multi-signatures to support both multiple messages signing and key aggregation
Li et al. Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks
Zhang et al. Efficient privacy protection authentication protocol for vehicle network in 5G
Fischlin et al. BUFFing Threshold Signature Schemes
Nakazawa et al. A strongly unlinkable group signature scheme with matching-based verifier-local revocation for privacy-enhancing crowdsensing
Hölzl et al. Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs
CN116032480B (en) A certificateless broadcast multi-signature method based on pair-less mapping
Bhargav-Spantzel et al. Multifactor identity verification using aggregated proof of knowledge
Kojima et al. A novel scheme of Schnorr multi-signatures for multiple messages with key aggregation
Payeras-Capellà et al. Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes
Lin et al. F2P‐ABS: A Fast and Secure Attribute‐Based Signature for Mobile Platforms
Zhang et al. Anonymous credential protocol based on SM2 digital signature
Nakanishi et al. Short DL-based blacklistable ring signatures from DualRing
Faonio et al. Subversion-resilient enhanced privacy ID